This table shows the 21 compliance areas where ISO 27001 and DORA controls overlap. When you mark a control as implemented in either framework, Venvera automatically propagates the status to the equivalent control in the other.
| Compliance Area | ISO 27001 | DORA |
|---|---|---|
| Encryption | A.8.24 | ict-10 |
| Access Control | A.5.15 | ict-11 |
| Identity Management | A.5.16 | ict-11 |
| Authentication & MFA | A.5.17, A.8.5 | ict-11 |
| Network Security | A.8.20, A.8.21, A.8.22 | ict-09 |
| Vulnerability Management | A.8.8 | ict-12 |
| Logging & Monitoring | A.8.15, A.8.16 | ict-14 |
| Incident Management | A.5.24, A.5.25, A.5.26 | inc-01 |
| Post-Incident Review | A.5.27 | inc-08 |
| Business Continuity | A.5.29, A.5.30 | ict-15 |
| Backup & Restoration | A.8.13 | ict-16 |
| Third-Party Risk Management | A.5.19, A.5.20 | tpr-01 |
| Supplier Due Diligence | A.5.21 | tpr-03 |
| Supplier Contracts | A.5.20 | tpr-06, tpr-07 |
| Supplier Monitoring | A.5.22 | tpr-04 |
| Risk Assessment | A.5.7 | ict-07 |
| Information Security Policy | A.5.1 | ict-08 |
| Security Awareness & Training | A.6.3 | ict-18 |
| Change Management | A.8.32 | ict-13 |
| Security Testing | A.5.35 | res-01 |
| Configuration Management | A.8.9 | ict-04 |
For details on how propagation works, thresholds, and the auto-mapped badge, see the Cross-Framework Control Propagation overview article.